The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Operation services are reusable and shareable units of configuration code executed by configuration management tools (CMTs), achieving continuous deployment and continuous delivery. With the prevalence of DevOps (Development and Operations), thousands of operation services have been developed for various software systems, and they are publicly available through the online repositories of popular CMTs...
It puts forward the design principle and goal of university administrative management system and elaborates on the design of function modules of its major subsystems. We mainly study the functional design of three major modules, user authentication module, announcement management module and official document management module. On the basis of analyzing various data mining model and algorithm, data...
This paper describes our approach towards developing and using a big data infrastructure for analyzing aviation data. In this paper, we briefly introduce our data sources, nature of data collected, cluster design, data loading and storage strategy and our language and library of choice for analytics and visualization. We present some of the analytics we have implemented for health monitoring of auxiliary...
Currently, the data size of Advanced Metering Infrastructure (AMI) system is leaping rapidly. The traditional data storage solution in most AMI systems utilize Relational Data Base Management System (RDBMS) However, current RDBMS can hardly meet the requirements of high-speed storage, computation and analysis when faced with mass data, which places a huge limit on potential applications. This paper...
In this paper, we present CLUE, a system event analytics tool for black-box performance diagnosis in production Cloud Computing systems. CLUE provides an unified and extensible means of profiling service transactional behaviors, and builds structured data called event sketches. CLUE further offers a set of analytic tools for summarizing and analyzing event sketches by integrating data mining and statistical...
Virtual reality (VR) and data mining techniques are widely used in E-commerce. This paper discusses the integration of personalized recommendation system in 3d virtual shopping environment. Our approach has two obvious features: one is the personalized recommendation based on data mining technologies, which means the system enhances the customer desired product attributes by utilizing his/her past...
This paper proposes a web-based On Line Analyse Process (OLAP) structure due to the weaknesses of OLAP system within the conventional Client/Server(C/S) structure. Studied with actual examples, a multidimensional model of web-based OLAP drilling analysis system has been designed, by applying the methods of link between Office Web Components and analysis server, various OLAP analysis operation through...
To fulfill the requirements of complex analyzing of drilling analysis system, aim at the inability of analysis power which exists in traditional information system by database technology, a data-warehouse-based OLAP system has been analyzed and studied within this paper. In accordance with the characteristics of users (which are wild spread at international level) of drilling system, a system of B/S...
This paper has designed a distributed monitoring and diagnosis system of engine locomotive. Diagnosis Unit which collecting the real-time parameter data such as GPS information and on-line diagnosis messages for locomotive diesel engine, is installed in each locomotive. It transmits data to the Data Transfer Station via GPRS module. Meanwhile, the Data Transfer Station is used as FTP server on Internet...
The requirement for supporting DVD-like functions raises new challenges to the design of P2P VoD systems. The uncertainty of frequent user DVD-like interactivity makes it difficult to ensure user perceived Quality of Experience (QoE) for real-time streaming services over distributed self-organized P2P overlay networks. Most existing solutions are based on the unreasonable assumption that all the users...
It is described the basic knowledge of data mining, SQL Server 2005 data mining platform and its function, and presented advanced structured scheme of data mining based on SQL Server 2005. On this basis, using decision tree algorithm provided by SQL Server implements data mining for an example, and results are forecast to achieve the desired purpose.
LDAP is quite popular in the storage of some certain kinds of data, And SDO is about how to integrate data in SOA environment and becomes more and more popular. Accessing to LDAP Using SDO will be quite useful. This paper discusses how to convert the schema from LDAP to SDO, and how to implement the functional model of LDAP using SDO and some other techniques.
XML database has been paid increasingly more attention by each institute or database firm along with the rapid development of XML technology. To evaluate the performance properly occupies an important position in XML database development, selection and using. This paper studies the proposal to use TPC-C in XML database benchmark, as well as specializes in the table schema, queries especially directed...
Trust management and trust negotiation are prevailing approaches for establishing trust relationship in grid-based systems across security domains and inter-domains. In this paper, we propose TTN, a combining trust management with trust negotiation mechanism which provides the authorization and access control for the Scientific Data Grid and aims to enhance the grid security. The framework takes into...
This paper outlines the first Asian network-based speech-to-speech translation system developed by the Asian Speech Translation Advanced Research (A-STAR) consortium. The system was designed to translate common spoken utterances of travel conversations from a certain source language into multiple target languages in order to facilitate multiparty travel conversations between people speaking different...
In general, all business intelligence takes the enterprise or organization's business data as the data source. This article takes stock information system as the carrier, uses the Web data as data sources, proposed the improved three-story intelligent frame for business intelligence, and realizes the stock information system based on the architecture of business intelligence solutions which includes...
SCTP (Stream Control Transport Protocol) is a latest transport protocol, which is mainly used to transport PSTN coder over IP network. Transport performance of SCTP, TCP and UDP will be compared in generic network. These findings suggest that transport performance of SCTP is greatly inferior to one of TCP and UDP. Relationship between number of SCTP stream and transport performance of SCTP are discussed...
With the resurgence of virtualization technologies and the development of multi-core technologies, the combination of the two becomes a trend. Therefore, inter-VM communication becomes a key part in how to improve the performance of virtual machines (VMs) basing on multi-core platform. In this paper, we first analyze the characteristics of multi-core tasks and the properties of virtual machine environment,...
In the paper, two SNS buddies relationship based authorization delegation mechanisms are introduced to enable SNS users to share his/her external protected resources with friends or friends' friends. Through this solution, user can share more information or documents with his/her friends in a controlled way; he/she can easily find the wanted information or documents with the help of social network...
Due to the various kinds of information expressing and transferring standards made by different vendors, the existing security products can not interoperate with each other efficiently. In order to solve this problem, an OVAL-compatible multiplatform vulnerability assessment system (VAS) is proposed in this paper. First, it adopts OVAL as the vulnerability assessment standard. Second, it takes lightweight...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.